skip to main content
Technical Operations > ICE Server > Tactical and Enterprise Modes of Operation
Tactical and Enterprise Modes of Operation
Instant Connect offers two primary modes of operation: Enterprise and Tactical.
*In Enterprise-mode, the system’s configuration (user identities, channels, etc) are managed by a centralized server.
*In Tactical-mode, users share channel configurations (aka Missions) through a QR code or a .ice file.
While these are often described as 'modes,' the term is misleading. Tactical and Enterprise interoperate together seamlessly in both ICE Desktop and ICE Mobile applications. A user can be logged into an ICE Server and also communicate on a tactical channel that was shared with them via email, for example. In both operating models, the same ICE media engine in used to transport audio between users. The primary difference is how configuration and presence data is distributed across teams.
The table below describes high level features :
Feature
Enterprise
Tactical
Centralized management and control of channel access
Supported
Not supported
Export and distribute channel configurations via file/QR code
Not supported
Supported
PTT over IGMP multicast
Supported
Supported
PTT over SSL using Rallypoints
Supported
Supported, but requires deployment of a Rallypoint component reachable on the network by tactical clients.
End-to-End PTT encryption
Supported
Supported
User online/offline presence
Supported
Supported within the context of a Mission (i.e., can tell if a user is participating in a shared Mission, can’t determine if the user is 'online' in a different Mission)
User location
Supported
Supported
Private telephone call between ICE users
Supported
Not supported
Public telephone call to PSTN via ICE Telephony
Supported
Not supported
Telephone dial-in to channel
Supported
Not supported
A Tactical user has no login credential (since there is no server to log into) but can establish their own display name. There is no concept of privileges or 'administrator' access in tactical mode since there is no centralized point of enforcement. Any user has the ability to create and modify channels which they can freely share with others. To prevent unauthorized users from eavesdropping on a channel, the creator of the tactical channel may assign an encryption key to the channel. Only users with whom the channel configuration has been shared will have the key necessary to decrypt audio transmitted on it.